共查询到20条相似文献,搜索用时 0 毫秒
1.
2.
时空混沌系统在保密通信中的应用 总被引:1,自引:1,他引:0
以环形腔中激光振荡输出空间扩展模型为例,研究了多组信息同时编码的时空混沌加密及解密,给出安全可靠的加解密结果,并对抗破译能力进行了检验,完成了互联网上保密通信实验,结果令人满意。 相似文献
3.
An image encryption scheme based on new spatiotemporal chaos 总被引:1,自引:0,他引:1
Spatiotemporal chaos is chaotic dynamics in spatially extended system, which has attracted much attention in the image encryption field. The spatiotemporal chaos is often created by local nonlinearity dynamics and spatial diffusion, and modeled by coupled map lattices (CML). This paper introduces a new spatiotemporal chaotic system by defining the local nonlinear map in the CML with the nonlinear chaotic algorithm (NCA) chaotic map, and proposes an image encryption scheme with the permutation-diffusion mechanism based on these chaotic maps. The encryption algorithm diffuses the plain image with the bitwise XOR operation between itself pixels, and uses the chaotic sequence generated by the NCA map to permute the pixels of the resulting image. Finally, the constructed spatiotemporal chaotic sequence is employed to diffuse the shuffled image. The experiments demonstrate that the proposed encryption scheme is of high key sensitivity and large key space. In addition, the scheme is secure enough to resist the brute-force attack, entropy attack, differential attack, chosen-plaintext attack, known-plaintext attack and statistical attack. 相似文献
4.
提出了一种基于时空混沌系统的Hash函数构造方法.以线性变换后的消息数作为一组初值来驱动单向耦合映像格子的时空混沌系统,产生时空混沌序列,取其空间最后一组混沌序列的适当项,线性映射为Hash值要求的128bit值.研究结果表明,这种基于时空混沌系统的Hash函数具有很好的单向性、弱碰撞性、初值敏感性,较基于低维混沌映射的Hash函数具有更强的保密性能,且实现简单.
关键词:
时空混沌
Hash函数
单向耦合映像格子 相似文献
5.
6.
We show analytically and numerically that a pair of uni-directionally coupled spatially extended systems can synchronize. For the case of partial differential equations the synchronization can be achieved by applying the scalar driving signals only at finite number of space points. Our approach is very general and can be useful for practical applications since the synchronization is achieved via feeding in the response system only the information from certain (discrete) spatial locations of the drive system. We also stress some open problems in the field of synchronization of spatiotemporal chaos. (c) 1997 American Institute of Physics. 相似文献
7.
An image block encryption scheme based on spatiotemporal chaos has been proposed recently.In this paper,we analyse the security weakness of the proposal.The main problem of the original scheme is that the generated keystream remains unchanged for encrypting every image.Based on the flaws,we demonstrate a chosen plaintext attack for revealing the equivalent keys with only 6 pairs of plaintext/ciphertext used.Finally,experimental results show the validity of our attack. 相似文献
8.
The collision and statistical properties of a one-way hash function based on spatiotemporal chaos are investigated. Analysis and simulation results indicate that collisions exist in the original algorithm and, therefore, the original algorithm is insecure and vulnerable. An improved algorithm is proposed to avoid the collisions. 相似文献
9.
The transient nature of spatiotemporal chaos is examined in reaction-diffusion systems with coexisting stable states. We find the apparent asymptotic spatiotemporal chaos of the Gray-Scott system to be transient, with the average transient lifetime increasing exponentially with medium size. The collapse of spatiotemporal chaos arises when statistical spatial correlations produce a quasihomogeneous medium, and the system obeys its zero-dimensional dynamics to relax to its stable asymptotic state. 相似文献
10.
11.
A self-adapting image encryption algorithm based on spatiotemporal chaos and ergodic matrix
下载免费PDF全文
![点击此处可从《中国物理 B》网站下载免费的PDF全文](/ch/ext_images/free.gif)
To ensure the security of a digital image, a new self-adapting encryption algorithm based on the spatiotemporal chaos and ergodic matrix is proposed in this paper. First, the plain-image is divided into different blocks of the same size, and each block is sorted in ascending order to obtain the corresponding standard ergodic matrix. Then each block is encrypted by the spatiotemporal chaotic system and shuffled according to the standard ergodic matrix. Finally, all modules are rearranged to acquire the final encrypted image. In particular, the plain-image information is used in the initial conditions of the spatiotemporal chaos and the ergodic matrices, so different plain-images will be encrypted to obtain different cipherimages. Theoretical analysis and simulation results indicate that the performance and security of the proposed encryption scheme can encrypt the image effectively and resist various typical attacks. 相似文献
12.
Three-wave interactions form the basis of our understanding of many pattern-forming systems because they encapsulate the most basic nonlinear interactions. In problems with two comparable length scales, it is possible for two waves of the shorter wavelength to interact with one wave of the longer, as well as for two waves of the longer wavelength to interact with one wave of the shorter. Consideration of both types of three-wave interactions can generically explain the presence of complex patterns and spatiotemporal chaos. Two length scales arise naturally in the Faraday wave experiment, and our results enable some previously unexplained experimental observations of spatiotemporal chaos to be interpreted in a new light. Our predictions are illustrated with numerical simulations of a model partial differential equation. 相似文献
13.
14.
15.
In this paper we examine a very simple and elegant example of high-dimensional chaos in a coupled array of flows in ring architecture that is cyclically symmetric and can also be viewed as an N-dimensional spatially infinite labyrinth (a "hyperlabyrinth"). The scaling laws of the largest Lyapunov exponent, the Kaplan-Yorke dimension, and the metric entropy are investigated in the high-dimensional limit (3相似文献
16.
17.
《Physics letters. A》2006,358(4):283-288
In this Letter, we introduce a new cryptosystem by integrating the asymptotic model of deterministic randomness with the one-way coupled map lattice (OCML) system. The key space, the encryption efficiency, and the security under various attacks are investigated. With the properties of deterministic randomness and spatiotemporal dynamics, the new scheme can improve the security to the order of computational precision, even when the lattice size is three only. Meanwhile, all the lattices can be fully utilized to increase the encryption speed. 相似文献
18.
Based on the techniques of the quantum remote state preparation via
a deterministic way, this paper proposes a quantum communication
scheme to distribute the secret messages in two phases, i.e., the
carrier state checking phase and the message state transmitting
phase. In the first phase, the secret messages are encoded by the
sender using a stabilizer quantum code and then transmitted to the
receiver by implementing three CNOT gates. In the second phase, the
communicators check the perfectness of the entanglement of the
transmitted states. The messages can be distributed to the receiver
even if some of the transmitted qubits are destroyed. 相似文献
19.
Jung P Wang J Wackerbauer R Showalter K 《Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics》2000,61(2):2095-2098
We introduce a measure to quantify spatiotemporal turbulence in extended systems. It is based on the statistical analysis of a coherent structure decomposition of the evolving system. Applied to a cellular excitable medium and a reaction-diffusion model describing the oxidation of CO on Pt(100), it reveals power-law scaling of the size distribution of coherent space-time structures for the state of spiral turbulence. The coherent structure decomposition is also used to define an entropy measure, which sharply increases in these systems at the transition to turbulence. 相似文献